<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Static Nat for sending syslog messages to remote site. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/static-nat-for-sending-syslog-messages-to-remote-site/m-p/2222990#M349422</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mahesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will answer here on the forums to your message.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The "logging" command you posted were a bit wrong.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reason is that the other server is local and is naturally located on the "inside" BUT the other remote site Syslog server would need the interface set to "outside" as its located behind that interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My intention was to first get your NAT, ACL and Logging configurations in order for you to be confirm through Internet that the logs were arriving at the remote site server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As soon as that is working you can temporarily disable the syslog sending to the remote site through "outside" and THEN we can start looking into adding the L2L VPN related configurations so you can have the ASAs send that syslog information to the remote site through a protected L2L VPN Connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just try to keep the configurations changes as simple as possible and confirm that the basics are working before trying something more complicated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 23 May 2013 16:51:21 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-05-23T16:51:21Z</dc:date>
    <item>
      <title>Static Nat for sending syslog messages to remote site.</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-for-sending-syslog-messages-to-remote-site/m-p/2222978#M349410</link>
      <description>&lt;P&gt;Hi Everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IF we have two sites and each site has syslog server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Site A&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Syslog server&amp;nbsp; IP 192.168.50.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Site B&lt;/P&gt;&lt;P&gt;Syslog server IP 192.168.60.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for redundancy purposes ASA at&amp;nbsp; each site will send all syslog messages to syslog server at its site and also to remote site.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so ASA1 will need to send syslog messages to 192.168.50.1 and 60.1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Syslog server is at inside interface of ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so need to know if we do static nat on the ASA&amp;nbsp; will this we ok on ASA1&amp;nbsp; version 8.2*******&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static(inside,outside) UDP 200.x.x.1&amp;nbsp; syslog 192.168.50.1 syslog&lt;/P&gt;&lt;P&gt;static(inside,outside) UDP 200.x.x.2 syslog 192.168.60.1 syslog&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So what config should i do on ASA2&amp;nbsp; at site 2?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also if i use public ip for each static NAT&amp;nbsp; then i can not use that IP for any other NAT right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:47:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-for-sending-syslog-messages-to-remote-site/m-p/2222978#M349410</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2019-03-12T01:47:46Z</dc:date>
    </item>
    <item>
      <title>Static Nat for sending syslog messages to remote site.</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-for-sending-syslog-messages-to-remote-site/m-p/2222979#M349411</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mahesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if I understood you correctly you have the following&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;2 sites with ASA firewalls&lt;/LI&gt;&lt;LI&gt;Both sites have their own Syslog servers&lt;/LI&gt;&lt;LI&gt;You want to send Syslogs from each ASA to its local Syslog server and also to the remote Syslog server&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this is correct then I would imagine you can use the Static PAT / Port Forward configuration on each ASA to enable the the remote site ASA to send Syslogs through the public network to the syslog server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would consider doing this through L2L VPN connection though so your are not sending Syslog in the public network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This would naturally include more configurations required BUT if you want to test this setup in some lab setup then I dont see a problem with it for testing purposes. From what I remember from our previous discussions, you have been aquiring ASAs for your own test lab to learn more about the firewalls?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are we talking abouta&amp;nbsp; lab environment with this Syslog setup OR is this for a real production network?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 May 2013 19:27:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-for-sending-syslog-messages-to-remote-site/m-p/2222979#M349411</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-22T19:27:44Z</dc:date>
    </item>
    <item>
      <title>Static Nat for sending syslog messages to remote site.</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-for-sending-syslog-messages-to-remote-site/m-p/2222980#M349412</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Oh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And forgot to answer the other question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use a single public IP address to both provide Internet access to LAN users with Dynamic PAT and also configure Static PAT like you have shown in your post.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These dont rule eachother out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 May 2013 19:34:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-for-sending-syslog-messages-to-remote-site/m-p/2222980#M349412</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-22T19:34:24Z</dc:date>
    </item>
    <item>
      <title>Static Nat for sending syslog messages to remote site.</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-for-sending-syslog-messages-to-remote-site/m-p/2222981#M349413</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here i am talking about production network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where two sites are connected via wan link.&lt;/P&gt;&lt;P&gt;So the commands which i mentioned earlier are more static NAT&amp;nbsp; right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 May 2013 19:36:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-for-sending-syslog-messages-to-remote-site/m-p/2222981#M349413</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-05-22T19:36:18Z</dc:date>
    </item>
    <item>
      <title>Static Nat for sending syslog messages to remote site.</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-for-sending-syslog-messages-to-remote-site/m-p/2222982#M349414</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The configuration you mentioned&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static(inside,outside) UDP 200.x.x.1&amp;nbsp; syslog 192.168.50.1 syslog&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static(inside,outside) UDP 200.x.x.2 syslog 192.168.60.1 syslog&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are Static PAT which in other words means Static Port Address Translation. Or even a more common name used for this type of NAT is Port Forwarding.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if we take the 2 Static PAT configurations above&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Site 1&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static(inside,outside) udp 200.x.x.1&amp;nbsp; syslog 192.168.50.1 syslog&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Would forward any Syslog traffic coming towards the public IP address of 200.x.x.1 to the inside IP address of 192.168.50.1&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Site 2&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static(inside,outside) udp 200.x.x.2 syslog 192.168.60.1 syslog&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Would forward any Syslog traffic coming towards the public IP address of 200.x.x.2 to the inside IP address of 192.168.60.1&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above coupled with the needed ACLs on each sites "outside" interfaces would allow you to send Syslog from one site to the Syslog server on the other site. Naturally you also need the "logging" configurations so that the ASA knows where to send the Syslogs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But I would again have to say that I would personally rather transfer this Syslog traffic through a L2L VPN connection between the sites so the Syslogs wouldnt be visible to anyone else on the public network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 May 2013 19:46:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-for-sending-syslog-messages-to-remote-site/m-p/2222982#M349414</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-22T19:46:50Z</dc:date>
    </item>
    <item>
      <title>Re: Static Nat for sending syslog messages to remote site.</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-for-sending-syslog-messages-to-remote-site/m-p/2222983#M349415</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If i config&amp;nbsp; below on Site 1 ASA&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static(inside,outside) UDP 200.x.x.1 syslog 192.168.50.1 syslog&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static(inside,outside) UDP 200.x.x.2 syslog 192.168.60.1 syslog&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Need to confirm below&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;So this will forward the traffic coming from Site 2&amp;nbsp; to site 1 ?&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Site 2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static(inside,outside) UDP 200.x.x.3 syslog 192.168.50.1 syslog&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static(inside,outside) UDP 200.x.x.4 syslog 192.168.60.1 syslog&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;This will forward the traffic coming from site 1&amp;nbsp;&amp;nbsp; to site&amp;nbsp; 2 right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also need to know i read that static NAT&amp;nbsp; is bidirectional .&lt;/P&gt;&lt;P&gt;So this static PAT is also bidirectional?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;also we have vpn&amp;nbsp; connection between 2 sites.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 May 2013 20:17:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-for-sending-syslog-messages-to-remote-site/m-p/2222983#M349415</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-05-22T20:17:46Z</dc:date>
    </item>
    <item>
      <title>Static Nat for sending syslog messages to remote site.</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-for-sending-syslog-messages-to-remote-site/m-p/2222984#M349416</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You dont need 2 Static PAT configurations on both sites. You just need a single Static PAT configuration on each site to enable the local Syslog server to be reached through the Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if Site 1 has a Syslog server with the IP address of 192.168.50.1 then you configure a Static PAT configuration for that on its local firewall and if the Site 2 has a Syslog server with the IP address of 192.168.60.1 then you configure a Static PAT configuration for that on its local firewall&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you using the "outside" interface IP address on each site OR do you have spare public IP addresses that can be used only for the Syslog servers?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you only have the single public IP address of the ASA "outside" interface then you have to use Static PAT. If you have spare IP addresses then you can use Static NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Static PAT using the "outside" interface IP address would be configured with&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Site 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) udp interface syslog 192.168.50.1 syslog netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Site 2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) udp interface syslog 192.168.60.1 syslog netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think you should probably try sending some logs through the Internet first and when that is working correctly then it will be easier to handle the L2L VPN configurations to support sending the logs through the VPN connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With regards to the bidirectionality of the NAT. Notice that we are talking about UDP and sending Syslogs. The other ASA will send Syslogs through the other ASA to the Syslog server there. The UDP traffic only has to go through the remote site ASA and since we are talking about UDP traffic there is no bidirectional traffic in Syslogs case. The Syslog server doesnt need to send anything to the ASA (to my knowledge atleast)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Static PAT should work just fine for you. As I said, if you have spare public IP address that we can dedicate for each Syslog server on each site THEN you can also use Static NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 May 2013 20:29:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-for-sending-syslog-messages-to-remote-site/m-p/2222984#M349416</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-22T20:29:30Z</dc:date>
    </item>
    <item>
      <title>Static Nat for sending syslog messages to remote site.</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-for-sending-syslog-messages-to-remote-site/m-p/2222985#M349417</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have Public IP to be used for syslog server.&lt;/P&gt;&lt;P&gt;Also if i config say each line on each site&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Site A&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) udp 200.x.x.x&amp;nbsp; syslog 192.168.50.1 syslog netmask 255.255.255.255.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;how will syslog message from site A devices will go to syslog server at site B?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Thanks&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 May 2013 21:03:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-for-sending-syslog-messages-to-remote-site/m-p/2222985#M349417</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-05-22T21:03:44Z</dc:date>
    </item>
    <item>
      <title>Static Nat for sending syslog messages to remote site.</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-for-sending-syslog-messages-to-remote-site/m-p/2222986#M349418</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ok, so you say that you have a spare public IP address to be dedicated to ONLY be used for the Syslog server then you can configure Static NAT instead of Static PAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So the Static NAT configuration would be&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) 200.x.x.x&amp;nbsp; 192.168.50.1 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you would have to have an ACL rule permitting the inbound Syslog traffic from the remote site&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN permit udp host y.y.y.y host 200.x.x.x eq syslog&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;y.y.y.y = Is the public IP address of the remote site ASA. The remote ASA will use its "outside" interface IP address as the source for the syslog messages it sends.&lt;/LI&gt;&lt;LI&gt;200.x.x.x = Is the public IP address used for the Syslog server Static NAT&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Presuming ofcourse your current "outside" interface ACL is named OUTSIDE-IN. You naturally use the name of the ACL you have in use.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So the above are the configurations on Site A. This enable Site B ASA to send Syslogs to server at Site A.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the same to work for Syslogs from Site A ASA to Site B Syslog server you need configurations on Site B ASA also.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) 200.x.x.x&amp;nbsp; 192.168.60.1 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN permit udp host y.y.y.y host 200.x.x.x eq syslog&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;y.y.y.y = Is the public IP address of&amp;nbsp; the remote site ASA. The remote ASA will use its "outside" interface IP&amp;nbsp; address as the source for the syslog messages it sends.&lt;/LI&gt;&lt;LI&gt;200.x.x.x = Is the public IP address used for the Syslog server Static NAT&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 May 2013 21:17:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-for-sending-syslog-messages-to-remote-site/m-p/2222986#M349418</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-22T21:17:10Z</dc:date>
    </item>
    <item>
      <title>Re: Static Nat for sending syslog messages to remote site.</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-for-sending-syslog-messages-to-remote-site/m-p/2222987#M349419</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The setup which we have here has different public IP at site A&amp;nbsp; and B&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For site A&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;STRONG&gt;static (inside,outside) 200.x.x.2 192.168.50.1 netmask 255.255.255.&lt;/STRONG&gt;255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Site B&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;STRONG&gt;static (inside,outside) 200.x.x.3&amp;nbsp; 192.168.60.1 netmask 255.255.255.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So i mean to say that Public IPs are different at both the sites.&lt;/P&gt;&lt;P&gt;Is this possible?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 May 2013 03:55:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-for-sending-syslog-messages-to-remote-site/m-p/2222987#M349419</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-05-23T03:55:42Z</dc:date>
    </item>
    <item>
      <title>Static Nat for sending syslog messages to remote site.</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-for-sending-syslog-messages-to-remote-site/m-p/2222988#M349420</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mahesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, ofcourse the public IP addresses are different on the sites. I guess I could have changed the IP addresses a bit in the configuration commands I mentioned. For example 200.x.x.x and 200.y.y.y.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So as I said it would probably be best that you first configure the Static NAT (as you seem to have spare public IP address that you can dedicate to the Syslog server on each site) and configure ACLs that allow the traffic from the other ASAs public IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When the NAT and ACL are configured correctly then you could try adding the "logging" configurations and start confirming that Syslogs from each site arrive to the remote site Syslog server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you have confirmed that this configuration is working correctly THEN we could temporarily remove the logging to the remote site and start looking at the L2L VPN configurations required so that you have move the Syslog traffic to the L2L VPN between the 2 sites that you say already existed. So one step at a time.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have enough information to configure the Static NAT for the Syslog server on each site?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When the NAT and ACL are done you should be able to use the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;logging host outside &lt;REMOTE server="" public="" ip="" configured="" with="" static="" nat=""&gt;&lt;/REMOTE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA might give a warning about the "security-level" value of the interface "outside" but this is to be expected as the ASA warns you that you are about to send Syslog information through an interface behind which the network is not secured by the ASA and in a sense secured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 May 2013 06:37:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-for-sending-syslog-messages-to-remote-site/m-p/2222988#M349420</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-23T06:37:14Z</dc:date>
    </item>
    <item>
      <title>Static Nat for sending syslog messages to remote site.</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-for-sending-syslog-messages-to-remote-site/m-p/2222989#M349421</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have send you message please read.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 May 2013 16:49:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-for-sending-syslog-messages-to-remote-site/m-p/2222989#M349421</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-05-23T16:49:17Z</dc:date>
    </item>
    <item>
      <title>Static Nat for sending syslog messages to remote site.</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-for-sending-syslog-messages-to-remote-site/m-p/2222990#M349422</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mahesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will answer here on the forums to your message.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The "logging" command you posted were a bit wrong.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reason is that the other server is local and is naturally located on the "inside" BUT the other remote site Syslog server would need the interface set to "outside" as its located behind that interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My intention was to first get your NAT, ACL and Logging configurations in order for you to be confirm through Internet that the logs were arriving at the remote site server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As soon as that is working you can temporarily disable the syslog sending to the remote site through "outside" and THEN we can start looking into adding the L2L VPN related configurations so you can have the ASAs send that syslog information to the remote site through a protected L2L VPN Connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just try to keep the configurations changes as simple as possible and confirm that the basics are working before trying something more complicated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 May 2013 16:51:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-for-sending-syslog-messages-to-remote-site/m-p/2222990#M349422</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-23T16:51:21Z</dc:date>
    </item>
    <item>
      <title>Static Nat for sending syslog messages to remote site.</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-for-sending-syslog-messages-to-remote-site/m-p/2222991#M349423</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On each ASA you will ofcourse have to use the Remote Syslog server public NAT IP address in the "logging" command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 May 2013 16:52:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-for-sending-syslog-messages-to-remote-site/m-p/2222991#M349423</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-23T16:52:15Z</dc:date>
    </item>
    <item>
      <title>Static Nat for sending syslog messages to remote site.</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-for-sending-syslog-messages-to-remote-site/m-p/2222992#M349424</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The IP addresses you mention in the message sent through the forums might be configured with Static NAT so you should look through your &lt;STRONG&gt;"show run static"&lt;/STRONG&gt; on the ASA to find the translations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or you have use &lt;STRONG&gt;"show run static | inc x.x.x.x"&lt;/STRONG&gt; where the &lt;STRONG&gt;"x.x.x.x"&lt;/STRONG&gt; is the public IP address&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 May 2013 17:44:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-for-sending-syslog-messages-to-remote-site/m-p/2222992#M349424</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-23T17:44:15Z</dc:date>
    </item>
    <item>
      <title>Static Nat for sending syslog messages to remote site.</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-for-sending-syslog-messages-to-remote-site/m-p/2222993#M349425</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mahesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should really try to post the answers and questions here on the discussion. It gets quite confusing reading the information on 2 different places.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if I should suggest you which steps to take regarding this Syslog setup configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Determine if the Syslog server on either side has a Static NAT or Static PAT configuration&lt;UL&gt;&lt;LI&gt;Use the command "show xlate | inc &lt;LOCAL ip="" address=""&gt;"&lt;/LOCAL&gt;&lt;/LI&gt;&lt;LI&gt;On one site insert its local IP address and on the other site its syslog servers local IP address&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;If you dont see any existing NAT configurations for these Syslog servers then determine if you have spare public IP addresses available that ARE NOT in any kind of use at the moment&lt;/LI&gt;&lt;LI&gt;Configure typical Static NAT using the Syslog server local IP address and the spare public IP address on each site. So one Static NAT per site.&lt;/LI&gt;&lt;LI&gt;On each site configure the "outside" ACL so that it allows Syslog traffic sourced from the Remote Sites ASAs "outside" interface IP address&lt;/LI&gt;&lt;LI&gt;Configure the "logging host outside &lt;REMOTE site="" syslog="" server="" public="" ip="" address=""&gt;" to enable logging to the remote syslog server&lt;/REMOTE&gt;&lt;/LI&gt;&lt;LI&gt;When the configurations are done, determine if the remote sites ASAs logs are arriving to the other sites Syslog server. Do this on both sites.&lt;/LI&gt;&lt;LI&gt;If it doesnt work, then you have to troubleshoot and determine that the ASA is actually trying to send the syslog traffic and that the remote ASA is allowing this syslog connectiong through&lt;/LI&gt;&lt;LI&gt;If things work, then we can look at changing this syslog information to go through a L2L VPN connection.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 May 2013 17:52:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-for-sending-syslog-messages-to-remote-site/m-p/2222993#M349425</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-23T17:52:37Z</dc:date>
    </item>
    <item>
      <title>Static Nat for sending syslog messages to remote site.</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-for-sending-syslog-messages-to-remote-site/m-p/2222994#M349426</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When i do sh run static | inc public ip&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it shows that it is statically mapped to syslog server at remote and local site.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So need to understand this that we use couple of public ip got from isp and map them to&amp;nbsp; internal syslog servers right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so this setup is just for logging logs from edge device to syslog right ?&lt;/P&gt;&lt;P&gt;so it does not&amp;nbsp; log message to remote syslog server right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mahesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 May 2013 17:54:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-for-sending-syslog-messages-to-remote-site/m-p/2222994#M349426</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-05-23T17:54:14Z</dc:date>
    </item>
    <item>
      <title>Re: Static Nat for sending syslog messages to remote site.</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-for-sending-syslog-messages-to-remote-site/m-p/2222995#M349427</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So you are saying that both sites ASAs have Static NAT for the the sites Syslog server? If this is correct then the Syslog server can be reached from the Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After this you would have to create an ACL rule on the "outside" interface ACL to allow syslog traffic from the remote sites ASAs "outside" interface IP address to the local syslog server public IP address. You would configure ACL rules on both sites to allow the other sites ASA to send Syslog to the public IP address of that sites Syslog server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When that is done you could enable syslogging on each sites ASA (towards the other sites syslog server)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;logging host outside &lt;REMOTE sites="" syslog="" servers="" public="" ip="" address=""&gt;&lt;/REMOTE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And if everything is fine, you should be able getting syslog messages from both ASA to both Syslog servers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And as I said before, after we confirm that the logs are going through from each site to the other then we could move this traffic to a L2L VPN connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In short these very first steps purpose is to&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Make sure that both sites have public IP address for the server configured&lt;/LI&gt;&lt;LI&gt;Confirm that both sites have an ACL rule that allow the syslog messages coming from the other site&lt;/LI&gt;&lt;LI&gt;Configure each ASA to send syslogs through the "outside" interface also to the other sites syslog server&lt;/LI&gt;&lt;LI&gt;Eventually move this traffic to the L2L VPN between the sites&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 May 2013 18:10:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-for-sending-syslog-messages-to-remote-site/m-p/2222995#M349427</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-23T18:10:12Z</dc:date>
    </item>
    <item>
      <title>Static Nat for sending syslog messages to remote site.</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-for-sending-syslog-messages-to-remote-site/m-p/2222996#M349428</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have tested the syslog connection of both sites via the internet.&lt;/P&gt;&lt;P&gt;I am doing this as we have to replace the existing syslog servers thats why i have to do the setup again.&lt;/P&gt;&lt;P&gt;Its a new setup now with New IP addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Earlier syslog messages to remote site were going Via GRE --&amp;nbsp; over IPSEC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Currently both site are sending syslog messages to each other via the internet.&lt;/P&gt;&lt;P&gt;This has been tested.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now i need to send the syslog messages internaly over the GRE tunnel.&lt;/P&gt;&lt;P&gt;GRE tunnel goes via IPsec between two sites.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have changed logging host from outside to inside as traffic needs to go via IPSEC&amp;nbsp; now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know the Router which has GRE&amp;nbsp; tunnel and the destination IP of tunnel goes via IPSEC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Need to know what step i should take on this ASA so that traffic goes via GRE&amp;nbsp; tunnel?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Should i define static route on ASA that to reach syslog server at each remote site we&amp;nbsp; should&amp;nbsp; go&amp;nbsp; to Router which has GRE tunnel configured?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;like route inside 192.168.60.1 255.255.255.0&amp;nbsp; ?&lt;/P&gt;&lt;P&gt;Going to sleep now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 May 2013 04:44:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-for-sending-syslog-messages-to-remote-site/m-p/2222996#M349428</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-05-24T04:44:51Z</dc:date>
    </item>
    <item>
      <title>Static Nat for sending syslog messages to remote site.</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-for-sending-syslog-messages-to-remote-site/m-p/2222997#M349429</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mahesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had no idea that you have a L2L VPN/GRE connection through some other routers in the network. I presumed that you had a L2L VPN connection between the ASA firewalls directly. This again naturally changes the setup completely.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does each of your ASA have a route towards the remote syslog server yet? Are you perhaps running dynamic routing between the sites as you are using IPsec + GRE?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the IP address/network of the interface of the ASA that has the route (or will have the route after configured) for the remote sites syslog server?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically you should first confirm that each site has a route towards the other sites syslog server network. You would also have to confirm that each site as a route for the network that is connected to the ASA interface from which you want to send the syslogs to the other site.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should be able to use the "show route" command on the ASAs and "show ip route" command on the router side to determine if the routing information needed is already there. If not, then some additions to the routing have to be made for each ASA to be able to send syslog to the other side.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 May 2013 05:31:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-for-sending-syslog-messages-to-remote-site/m-p/2222997#M349429</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-24T05:31:25Z</dc:date>
    </item>
  </channel>
</rss>

